
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Webinar
Supply Chain Guardians: Strategies for Resilient Ecosystems
February 28, 2024More DetailsSecurity Ratings, Supply Chain Cyber Risk -
Learning Center
Enhancing Your Cyber Defense: A Comprehensive Comparison of IDS vs IPS Technologies
February 23, 2024Businesses and individuals alike must employ robust security measures to protect their sensitive data and networks. Two key technologies in the realm of cybersecurity are Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). While both are crucial components of a comprehensive security strategy, understanding their differences is key for effective implementation and a robust cybersecurity posture. Here, we'll delve into the intricacies of IDS and IPS technologies, comparing their features, functionalities, and applications.
More DetailsTech Center -
Learning Center
Integrating Defender for Identity Into Your Security Strategy: A Step-by-Step Guide
February 23, 2024In this step-by-step guide, we'll walk you through the process of incorporating Defender for Identity into your cybersecurity program, empowering you to enhance your organization's security posture and defend against unauthorized access.
More DetailsTech Center -
Blog, Learning Center
Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk
February 22, 2024Ask these ten key questions to make sure your organization’s vendor questionnaire doesn't become just a “check-the-box” exercise.
More DetailsSupply Chain Cyber Risk, Tech Center -
Blog
Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group
February 22, 2024After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit
More DetailsRob Ames, Senior Staff Threat Researcher; James Niven, Senior Staff Threat Researcher
Cyber Threat Intelligence -
Blog
3 2 1… Impact! Early Results under the SEC’s Cybersecurity Governance Rule
February 22, 2024The early results under the SEC's cybersecurity governance rule are in: companies need better preparedness and processes for compliance.
More DetailsOwen Denby, General Counsel, SecurityScorecard & Justin Daniels, Shareholder, Baker Donelson
Public Sector, Services -
Webinar
The Founders’ Take: Strategies for Cyber Resilience Despite Insecurity
February 22, 2024More DetailsExecutive Viewpoint -
Blog
Chinese Hacking Group Targets US Critical Infrastructure
February 20, 2024The FBI and CISA are warning that “Volt Typhoon” has been lurking in US critical infrastructure systems for at least five years.
More DetailsCyber Threat Intelligence -
Learning Center
The Human Factor in Cybersecurity
February 16, 2024While technological advancements continue to fortify digital defenses, human behavior remains a pivotal element in determining the success or failure of cybersecurity measures.
More DetailsTech Center -
Learning Center
What Exactly is the Dark Web?
February 16, 2024At its core, the dark web is a part of the internet that is not indexed by traditional search engines like Google.
More DetailsTech Center -
Learning Center
How to Avoid Social Engineering Attacks
February 15, 2024In today's digital era, we rely heavily on the use of modern technology. There is no doubt that the use of modern technologies has made our lives a lot easier, but it has many downsides as well. These innovative technologies have made us more vulnerable to social engineering attacks than ever before.
More DetailsTech Center -
Press
SecurityScorecard Achieves StateRAMP®
February 15, 2024U.S. state and local government agencies to adopt ‘A to F’ letter grades to measure and improve cybersecurity resilience.
More DetailsPublic Sector